Fully homomorphic encryption over the integers with shorter public keys JS Coron, A Mandal, D Naccache, M Tibouchi Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 630 | 2011 |
Function-hiding inner product encryption is practical S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu Security and Cryptography for Networks: 11th International Conference, SCN …, 2018 | 138 | 2018 |
A domain extender for the ideal cipher JS Coron, Y Dodis, A Mandal, Y Seurin Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 56 | 2010 |
Security Analysis of the Mode of JH Hash Function. R Bhattacharyya, A Mandal, M Nandi FSE 6147, 168-191, 2010 | 54 | 2010 |
On the public indifferentiability and correlation intractability of the 6-round Feistel construction A Mandal, J Patarin, Y Seurin Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012 | 36 | 2012 |
PSS is secure against random fault attacks JS Coron, A Mandal Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 30 | 2009 |
Homomorphic signatures and network coding signatures DL Nguyen, T Acar, A Mandal US Patent 9,722,776, 2017 | 28 | 2017 |
Improved security analysis of PMAC M Nandi, A Mandal Journal of Mathematical Cryptology 2 (2), 149-162, 2008 | 27 | 2008 |
Cryptanalysis of the RSA subgroup assumption from TCC 2005 JS Coron, A Joux, A Mandal, D Naccache, M Tibouchi Public Key Cryptography–PKC 2011: 14th International Conference on Practice …, 2011 | 26 | 2011 |
Relational encryption for password verification R Kamakari, T Shimoyama, H Tsuda, Y Yaginuma, A Mandal, A Roy, ... US Patent 10,129,028, 2018 | 25 | 2018 |
Privacy preserving set-based biometric authentication J Hartloff, A Mandal, A Roy US Patent 9,967,101, 2018 | 24 | 2018 |
Indifferentiability characterization of hash functions and optimal bounds of popular domain extensions R Bhattacharyya, A Mandal, M Nandi Progress in Cryptology-INDOCRYPT 2009: 10th International Conference on …, 2009 | 24 | 2009 |
Indifferentiability beyond the birthday bound for the xor of two public random permutations A Mandal, J Patarin, V Nachef Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 19 | 2010 |
Data oblivious genome variants search on Intel SGX A Mandal, JC Mitchell, H Montgomery, A Roy Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2018 | 18 | 2018 |
Relational encryption R Kamakari, T Shimoyama, H Tsuda, Y Yaginuma, A Mandal, A Roy, ... US Patent 9,660,991, 2017 | 16 | 2017 |
Relational encryption A Mandal, A Roy, H Montgomery US Patent 9,674,189, 2017 | 14 | 2017 |
Privacy preserving biometric authentication based on error correcting codes A Mandal, A Roy US Patent 9,438,590, 2016 | 14 | 2016 |
On elapsed time consensus protocols M Bowman, D Das, A Mandal, H Montgomery Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021 | 13 | 2021 |
Ising-based consensus clustering on specialized hardware E Cohen, A Mandal, H Ushijima-Mwesigwa, A Roy Advances in Intelligent Data Analysis XVIII: 18th International Symposium on …, 2020 | 13 | 2020 |
Privacy-preserving biometric authentication A Mandal, A Roy US Patent 9,774,596, 2017 | 13 | 2017 |